martyr Posted March 11, 2015 Share Posted March 11, 2015 (edited) Hello everyone, I am trying to sniff a network. Adapter TL-WN722N Target AP signal: %80-85 Target network topology: 1 router, 15 clients (mostly windows) My steps are: echo 1 > /proc/sys/net/ipv4/ip_forward airmon-ng start wlan0 going to /etc/ettercap/etter.conf to set: ec_uid = 0 ec_gid = 0 -- Commenting out iptables # if you use iptables: redir_command_on = "iptables -t n.... redir_command_off = "iptables -t ...... and then ettercap -G Sniff -> Unified Sniffing, selecting adapter wlan0 Hosts -> Scan Hosts -> Add victims to target list and then MITM->Arp and then Start->Start Sniffing And then running dsniff -i wlan0 to sniff interesting packets... Okay everything works great until here. Sometimes, ettercap kills the connection of client. As far i understand, i am forwarding packets with ARP Poisoning. So here are my questions: - Is that possible to sniff network in "passive" or "unoffensive" mode? Ettercap has "Unoffensive" option but if i go with that, i can't scan hosts. I can't understand by. - My purpose is that just sniffing network, not ALTER or EDIT any packets. Just sniffing. - How can i start a proper sniffing? My target AP has %80-85 signal quality. No packet loss to gateway. Any suggestions would be great. Thanks. Edited March 11, 2015 by martyr Quote Link to comment Share on other sites More sharing options...
martyr Posted March 12, 2015 Author Share Posted March 12, 2015 Bump! Extra note: I have tried arpspoof too, instead of Ettercap. It doesn't kill the connection of client. But SSLstrip returns nothing. Strange. Quote Link to comment Share on other sites More sharing options...
cooper Posted March 12, 2015 Share Posted March 12, 2015 There are limits to what sslstrip can do, specifically in relation to HSTS. If you just want to sniff, start low-level and run wireshark to see traffic is flowing through you. Quote Link to comment Share on other sites More sharing options...
martyr Posted March 12, 2015 Author Share Posted March 12, 2015 Hello Cooper, Yeah, i did this. No interesting traffic on Wireshark. So i have to go with promiscuous mode, right? Quote Link to comment Share on other sites More sharing options...
cooper Posted March 12, 2015 Share Posted March 12, 2015 When you sniff packets, yeah, promiscuous all the way. No "interesting" traffic, or only your own traffic? Quote Link to comment Share on other sites More sharing options...
martyr Posted March 12, 2015 Author Share Posted March 12, 2015 How can i go prosmiscuous in the Wireshark? Just my own traffic, nothing more in Wireshark :) Quote Link to comment Share on other sites More sharing options...
digip Posted March 13, 2015 Share Posted March 13, 2015 Its under the adapter settings in wireshark. Capture > interfaces > options for the NIC in use, or for both if you want to use monitor and managed mode at the same time. Quote Link to comment Share on other sites More sharing options...
martyr Posted March 23, 2015 Author Share Posted March 23, 2015 hi digip, sorry for the late reply. i have been waiting for my new wifi adapter. well, no traffic in prosmiscuous mode. i mean, just dhcp and SSDP requests. nothing more. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.